Businesses in Danger: Data Transfer between Cloud Apps

Businesses in Danger: Data Transfer between Cloud Apps

Businesses in Danger: Data Transfer between Cloud Apps The cloud has been sold to businesses as an inexpensive alternative to having dedicated servers on-site but the big drawback is that you know longer have control of the data.  I constantly have to explain to...
Businesses Must Understand The Intricacies of Cloud Security

Businesses Must Understand The Intricacies of Cloud Security

Businesses Must Understand The Intricacies of Cloud Security It does not matter the size of the organization or the complexity of the operations businesses have been sold on the idea that “the cloud” is the answer.  For MGM Resorts they found out that the data they...
Malware on Macs: Not as Bad as the Headlines Might Lead You to Believe

Malware on Macs: Not as Bad as the Headlines Might Lead You to Believe

Malware on Macs: Not as Bad as the Headlines Might Lead You to Believe   Apple designs their computers with a security-first mindset but that does not  mean that they are not able to be compromised by enterprising cybercriminals. Although, just like with all news...
All Businesses are Tech Businesses – Like it or Not

All Businesses are Tech Businesses – Like it or Not

All Businesses are Tech Businesses – Like it or Not The world of information is remaking businesses with new technologies turning all businesses into technology companies like it or not.  Companies who continue to believe that they are not technology companies...
1.77 Billion  – That is how much Businesses lost last year to Business Email Compromises

1.77 Billion – That is how much Businesses lost last year to Business Email Compromises

1.77 Billion  – That is how much Businesses lost last year to Business Email Compromises One of the most significant cybersecurity dangers to Businesses is known as Business Email Compromise attacks.  These types of attacks are carried out by cybercriminals and...
Four States Use A Flaw Filled Mobile Voting App

Four States Use A Flaw Filled Mobile Voting App

Four States Use A Flaw Filled Mobile Voting App Creating a secure voting application is near to impossible.  WIth hackers right on the tails of technology working to thwart every advantage, it will be a long while until we can create an app that could assure the...